vrfcore.dll
Description: Application Verifier Provider - Core Verification and SDK
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.26100.4654
Architecture: 32-bit
Operating System: Windows NT
SHA256: 954244b043737d8f24813af5999f279c
File Size: 170.4 KB
Uploaded At: Dec. 1, 2025, 8:06 a.m.
Views: 8
Exported Functions
- AVrfAPILookupCallback (Ordinal: 1, Address: 0x3290)
- VerifierGetInfoForException (Ordinal: 2, Address: 0x4b20)
- VerifierAreStaticDllsInitialized (Ordinal: 3, Address: 0x45f0)
- VerifierChainDuplicateHooks (Ordinal: 4, Address: 0x46f0)
- VerifierCloseLayerProperties (Ordinal: 5, Address: 0x3f30)
- VerifierConfigureStopOptions (Ordinal: 6, Address: 0x48e0)
- VerifierCreateLayerProperties (Ordinal: 7, Address: 0x3e90)
- VerifierDisableFaultInjectionExclusionRange (Ordinal: 8, Address: 0xae10)
- VerifierDisableFaultInjectionTargetRange (Ordinal: 9, Address: 0xac80)
- VerifierDisableLayer (Ordinal: 10, Address: 0x79f0)
- VerifierDisableVerifier (Ordinal: 11, Address: 0x7f30)
- VerifierEnableFaultInjectionExclusionRange (Ordinal: 12, Address: 0xad20)
- VerifierEnableFaultInjectionTargetRange (Ordinal: 13, Address: 0xab90)
- VerifierEnableLayer (Ordinal: 14, Address: 0x73a0)
- VerifierGetAppCallerAddress (Ordinal: 15, Address: 0x6b80)
- VerifierGetLoggingDirectory (Ordinal: 16, Address: 0x45c0)
- VerifierGetRecursionTlsSlot (Ordinal: 17, Address: 0x4670)
- VerifierHandleVerifierStopException (Ordinal: 18, Address: 0x4930)
- VerifierIsDllEntryActive (Ordinal: 19, Address: 0x4890)
- VerifierIsInsideVerifierStop (Ordinal: 20, Address: 0x48c0)
- VerifierIsLayerEnabled (Ordinal: 21, Address: 0x4430)
- VerifierLdrGetProcedureAddress (Ordinal: 22, Address: 0x4860)
- VerifierOpenLayerProperties (Ordinal: 23, Address: 0x3df0)
- VerifierQueryGlobalProperties (Ordinal: 24, Address: 0x4940)
- VerifierQueryLayerBreak (Ordinal: 25, Address: 0x4150)
- VerifierQueryLayerBreaks (Ordinal: 26, Address: 0x4100)
- VerifierQueryLayerProperties (Ordinal: 27, Address: 0x3f50)
- VerifierQueryLayerProperty (Ordinal: 28, Address: 0x4090)
- VerifierQueryRegisteredLayers (Ordinal: 29, Address: 0x7210)
- VerifierRegisterFaultInjectProvider (Ordinal: 30, Address: 0xa900)
- VerifierRegisterLayer (Ordinal: 31, Address: 0x6d50)
- VerifierRegisterLayerEx (Ordinal: 32, Address: 0x6d70)
- VerifierRegisterProvider (Ordinal: 33, Address: 0x9e30)
- VerifierResetFaultInjectionAddressRanges (Ordinal: 34, Address: 0xaeb0)
- VerifierSetAPIClassName (Ordinal: 35, Address: 0xaf60)
- VerifierSetFaultInjectionProbability (Ordinal: 36, Address: 0xaa80)
- VerifierSetFaultInjectionSeed (Ordinal: 37, Address: 0xab00)
- VerifierSetLayerBreak (Ordinal: 38, Address: 0x4270)
- VerifierSetLayerProperty (Ordinal: 39, Address: 0x4530)
- VerifierShouldFaultInject (Ordinal: 40, Address: 0xa980)
- VerifierStopMessageEx (Ordinal: 41, Address: 0x3750)
- VerifierSuspendFaultInjection (Ordinal: 42, Address: 0xab30)
- VerifierTlsGetValue (Ordinal: 43, Address: 0x95b0)
- VerifierTlsSetValue (Ordinal: 44, Address: 0x95f0)
- VerifierUnregisterLayer (Ordinal: 45, Address: 0x6d90)
Imported DLLs & Functions
ntdll.dll
- _stricmp (Address: 0x10019054)
- _vsnprintf (Address: 0x10019038)
- _vsnwprintf (Address: 0x10019024)
- _wcsicmp (Address: 0x1001902c)
- _wcsnicmp (Address: 0x1001901c)
- DbgPrint (Address: 0x100190c0)
- DbgPrintEx (Address: 0x10019004)
- LdrAccessResource (Address: 0x10019090)
- LdrDisableThreadCalloutsForDll (Address: 0x10019118)
- LdrEnumerateLoadedModules (Address: 0x10019014)
- LdrFindEntryForAddress (Address: 0x10019018)
- LdrFindResource_U (Address: 0x10019070)
- LdrGetDllHandle (Address: 0x100190f0)
- LdrGetProcedureAddress (Address: 0x10019000)
- LdrLoadDll (Address: 0x10019010)
- LdrLockLoaderLock (Address: 0x10019074)
- LdrUnloadDll (Address: 0x10019034)
- LdrUnlockLoaderLock (Address: 0x10019084)
- memcpy (Address: 0x1001912c)
- memmove (Address: 0x10019124)
- memset (Address: 0x10019130)
- NtAllocateVirtualMemory (Address: 0x100190ac)
- NtClose (Address: 0x1001904c)
- NtCreateFile (Address: 0x100190bc)
- NtCreateKey (Address: 0x100190e8)
- NtDelayExecution (Address: 0x100190b4)
- NtDeleteKey (Address: 0x100190d0)
- NtDeleteValueKey (Address: 0x10019044)
- NtFreeVirtualMemory (Address: 0x10019098)
- NtOpenKey (Address: 0x100190d4)
- NtProtectVirtualMemory (Address: 0x100190f4)
- NtQueryInformationProcess (Address: 0x10019030)
- NtQueryKey (Address: 0x100190cc)
- NtQueryPerformanceCounter (Address: 0x10019114)
- NtQuerySystemTime (Address: 0x10019028)
- NtQueryValueKey (Address: 0x10019064)
- NtQueryVirtualMemory (Address: 0x10019008)
- NtReadVirtualMemory (Address: 0x10019048)
- NtResumeThread (Address: 0x100190fc)
- NtSetValueKey (Address: 0x1001905c)
- NtTerminateProcess (Address: 0x10019020)
- NtWaitForSingleObject (Address: 0x100190c8)
- NtWriteFile (Address: 0x1001909c)
- RtlAcquirePebLock (Address: 0x10019078)
- RtlAllocateHeap (Address: 0x1001906c)
- RtlAnsiStringToUnicodeString (Address: 0x10019104)
- RtlApplicationVerifierStop (Address: 0x10019068)
- RtlCaptureContext (Address: 0x1001911c)
- RtlCaptureStackBackTrace (Address: 0x10019040)
- RtlCompareMemory (Address: 0x100190f8)
- RtlCompareUnicodeString (Address: 0x10019100)
- RtlCopyUnicodeString (Address: 0x100190a8)
- RtlDeleteCriticalSection (Address: 0x10019094)
- RtlDllShutdownInProgress (Address: 0x1001900c)
- RtlDoesFileExists_U (Address: 0x100190c4)
- RtlDosPathNameToNtPathName_U (Address: 0x100190a4)
- RtlEnterCriticalSection (Address: 0x10019050)
- RtlFindClearBitsAndSet (Address: 0x10019088)
- RtlFreeHeap (Address: 0x10019080)
- RtlFreeUnicodeString (Address: 0x100190a0)
- RtlImageDirectoryEntryToData (Address: 0x10019108)
- RtlImageNtHeader (Address: 0x1001910c)
- RtlInitAnsiString (Address: 0x100190e0)
- RtlInitializeCriticalSection (Address: 0x100190b8)
- RtlInitUnicodeString (Address: 0x1001903c)
- RtlInitUnicodeStringEx (Address: 0x100190dc)
- RtlLeaveCriticalSection (Address: 0x10019058)
- RtlQueryEnvironmentVariable_U (Address: 0x100190b0)
- RtlRaiseException (Address: 0x10019060)
- RtlRandom (Address: 0x10019110)
- RtlReleasePebLock (Address: 0x1001908c)
- RtlUnhandledExceptionFilter (Address: 0x10019120)
- RtlUnicodeStringToAnsiString (Address: 0x1001907c)
- RtlUnwind (Address: 0x10019128)
- wcsrchr (Address: 0x100190ec)
- wcsstr (Address: 0x100190e4)
- wcstoul (Address: 0x100190d8)